2014 Sixth International Conference on Computational Intelligence, Communication Systems and Networks 2014
DOI: 10.1109/cicsyn.2014.31
|View full text |Cite
|
Sign up to set email alerts
|

Analytical Hierarchy Process Approach for the Metrics of Information Security Management Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…Although the paper mentions the use of 3 levels of information security risk criteria in the evaluation, it does not specify exactly what the criteria are as well as their calculated weights. In their work [60], Moeti and Kalema identified the metrics required to design an information security management framework and classified them into categories, whereby metric validation was made by using the AHP. The results of the study indicate that environmental metrics are critical for managing information security, where in that category belong malicious code threats, inherent vulnerabilities in the information system and networks, and the regulatory and legal framework.…”
Section: Analysis Of Papersmentioning
confidence: 99%
“…Although the paper mentions the use of 3 levels of information security risk criteria in the evaluation, it does not specify exactly what the criteria are as well as their calculated weights. In their work [60], Moeti and Kalema identified the metrics required to design an information security management framework and classified them into categories, whereby metric validation was made by using the AHP. The results of the study indicate that environmental metrics are critical for managing information security, where in that category belong malicious code threats, inherent vulnerabilities in the information system and networks, and the regulatory and legal framework.…”
Section: Analysis Of Papersmentioning
confidence: 99%
“…This approach allows for the customization of metric weights based on specific organizational requirements and risk factors. Early uses of AHP in security metrics (e.g., Moeti and Kalema [41] and Turskis et al [42]) purely rely on human judgements (not using well-established computed metrics). Sun et al [22] design an automatic security analysis tool that integrates security metrics collection, management, and visualization to understand the security of computer systems.…”
Section: Related Workmentioning
confidence: 99%